Here at Tom’s Guide our expert editors are committed to bringing you the best news, reviews and guides to help you stay informed and ahead of the curve!
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Daily (Mon-Sun)
Tom's Guide Daily
Sign up to get the latest updates on all of your favorite content! From cutting-edge tech news and the hottest streaming buzz to unbeatable deals on the best products and in-depth reviews, we’ve got you covered.
Weekly on Thursday
Tom's AI Guide
Be AI savvy with your weekly newsletter summing up all the biggest AI news you need to know. Plus, analysis from our AI editor and tips on how to use the latest AI tools!
Weekly on Friday
Tom's iGuide
Unlock the vast world of Apple news straight to your inbox. With coverage on everything from exciting product launches to essential software updates, this is your go-to source for the latest updates on all the best Apple content.
Weekly on Monday
Tom's Streaming Guide
Our weekly newsletter is expertly crafted to immerse you in the world of streaming. Stay updated on the latest releases and our top recommendations across your favorite streaming platforms.
Join the club
Get full access to premium articles, exclusive features and a growing list of member rewards.
Roku has suffered a massive data breach, with as many as 15,363 customers affected and their data stolen, including credit card information, passwords, and usernames.
Roku announced the breach in a public memo sent to customers dated March 8th, citing various information on what happened and what the company is doing to combat the issue.
According to BleepingComputer, the purported hackers who not only stole the data but used it to buy into streaming platforms and other products also sold off stolen Roku accounts for just $0.50 per individual user.
Roku stuffing attack
Threat actors involved in the Roku data breach targeted Roku.com itself using so-called SilverBullet or Open Bullet 2 cracking tools. These allow hackers access into locked accounts by way of credential stuffing on Roku’s website, thereby allowing them to change the passwords and collect all of the valuable information associated with the account, including credit cards, emails, shipping addresses, and more.
Once in control of an account, threat actors can use the stolen information fraudulently — in this case buying up streaming subscriptions and other hardware via Roku’s Shopify integration.
According to BleepingComputer's sources, the threat actors that targeted Roku were actively engaging in the mass breach for several months utilizing imported custom configuration files, or simply custom configs, and a variation of proxy servers to bypass captchas and other protective resources.
Account holders affected by the data breach are requested by Roku to visit “my.roku.com” and to reset their password using the “Forgot password?” tool.
Several of these stolen Roku accounts were discovered on a variety of account marketplaces for as low as $0.50. At the time of writing, as many as 440 accounts have been sold, with details on how fraudulent buyers can utilize the provided information for nefarious purposes, most notably to buy light strips, remotes, soundbars, cameras, and more using stolen credit cards.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Account holders affected by the data breach are requested by Roku to visit “my.roku.com” and to reset their password using the “Forgot password?” tool. Once you have accessed your account, ensure that all of your information, including connected devices and active subscriptions, are in order via the Roku dashboard.
Roku’s data breach statement
Roku has addressed the issue in a memo to its customers sent out on Friday of last week. The company details how “unauthorized actors were able to obtain login information from third-party sources” and that said threat actors were then able to alter “Roku logins for the affected individual Roku accounts.”
Although Roku has stated that it secured all impacted accounts and has enforced a password reset wherever possible following the incident, without any two factor authentication on even the best Roku devices and services, it’s quite a conundrum to face for its customers.
It’s best to ensure that all of your passwords across services are altered following the breach and to contact your banks to keep your credit cards secure. It’s a bit more complicated for stolen address information, but you’ll be sleeping soundly given threat actors won’t be able to access your other accounts and credit cards.
Roku’s data breach comes on the heels of a rather problematic user agreement change, which disallowed users access to their TVs until accepting the new policy. The breach is in no way connected to these changes, but highlights many problems currently under the Roku banner — despite the firm’s OS being hailed as the number one selling TV OS in the US.
More from Tom's Guide
- Want to be hacked? Just make these password mistakes
- I switched from Apple TV 4K to the Roku Ultra for 1 month — here's what happened
- 26 billion records exposed online in biggest data leak ever — what to do now

Ryan Epps is a Staff Writer under the TV/AV section at Tom's Guide focusing on TVs and projectors. When not researching PHOLEDs and writing about the next major innovation in the projector space, he's consuming random anime from the 90's, playing Dark Souls 3 again, or reading yet another Haruki Murakami novel.
